Description
Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.
References (8)
Core 8
Core References
Mailing List, Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/
Vendor Advisory
https://security.netapp.com/advisory/ntap-20230601-0007/
Vendor Advisory x_refsource_confirm
https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6
Issue Tracking, Patch x_refsource_misc
https://github.com/redis/redis/pull/11149
Patch x_refsource_misc
https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c
Scores
CVSS v3
5.5
EPSS
0.0034
EPSS Percentile
56.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-617
CWE-20
Status
published
Products (5)
debian/debian_linux
10.0
fedoraproject/fedora
36
fedoraproject/fedora
37
fedoraproject/fedora
38
redis/redis
< 6.0.19
Published
Apr 18, 2023
Tracked Since
Feb 18, 2026